Early bird registration rate ends on the 30th of September
Nowadays there are a lot of tools to analyze traffic, but the most important thing to have is the experience and knowledge of a malware analyst. The goal of the workshop is to give a hands-on experience on analyzing the behavior of malware and botnet traffic in the network by studying their web patterns and their traffic behavior. The workshop will use both pcap files of real malware captures and real normal captures. Participants will learn a proven approach on how to do their traffic analysis, how to recognize malicious connections, how to separate normal behaviors from malicious behaviors, how to recognize anomalous patterns and how to deal with large amounts of traffic. Analyzing only malware traffic may not be so complicated for some people, but accurately separating it from normal traffic is harder.
The most important lesson of the workshop is not about how to use wireshark or tcpdump. The goal is to transmit the experience of recognizing the malicious actions of malware in the network. Specifically how malware hides, how to recognize the encryptions, how to analyze the web patterns and how to discard false connections. The participants should leave with a good knowledge about how to do an overall analysis picture of the traffic to recognize if there are malicious behaviors on it.
TBA
TBA
Attendees are required to have a medium knowledge on TCP/IP, common protocols, and networking. Attendees are also required to have:
TBA
2. Revision of how network protocols work
○ Ethernet, ARP, ICMP, IP, TCP, UDP, HTTP, DNS, SSH, SSL/TLS
3. Capturing traffic
● Introduction to standard tools for traffic capture and analysis: ○ Wireshark
4. Experience of analysis of normal traffic and malware traffic
○ What can you say about it? malware or normal?
● 3rd Example: Analysis of traffic capture #3
○ What can you say about it? is it malware or normal?
● 6th Example: Analysis of traffic capture #6
○ This is a large example. Your mission, if you accept it, is to discover if it is an attack or not, and what happened. You have 30 min. We expect your report.
5. First day wrap up
Day II
1. Introduction to second day
● Goals and agenda
2. Working with large files: slicing, filtering, and analysing
○ capinfos, tcpstat, editcap
3. Working with large files: flows and behaviors
○ Configuration files will be provided
○ Use argus to see the flows. Try to identify the interesting connections.
■ argus -F /etc/argus.conf -r capture1.pcap -w – “not arp and not ipv6” | ra
-F /etc/ra.conf -r – -n -Z b -s +suser:400 +duser:400|less ○ Which features are calling your attention?
● Example 2: Normal Capture (#8)
○ Use argus as above to see the flows with data.
○ Capture packets in several points in the network
■ argus -F argus.conf -i eth0 -P 200 ○ Get the flows with rasplit
4. Attacking each other and discovering the traffic
○ As root
■ passwd (and put a good password)
● Create another user (unprivileged). The name of the user is test ■ useradd test
● Start the SSH service
○ /etc/init.d/ssh restart
● Change the password of the test user
○ First get one password randomly from the file.
■ N=`shuf -i 1-15 -n 1`; head -n $N best15.txt |tail -n 1
○ Then change it with the command (put it twice): ■ passwd test
● Put here the password printed by the previous command.
● Find other hosts in the network with the SSH port open
○ nmap -sS -p 22 -n -v <your-ip-address>/24 -oN ssh-servers.txt
5. Wrap up of second day, and closing the training